首页期刊导航|中国科学:信息科学(英文版)
期刊信息/Journal information
中国科学:信息科学(英文版)
中国科学:信息科学(英文版)

周光召

月刊

1674-733X

informatics@scichina.org

010-64015683

100717

北京东黄城根北街16号

中国科学:信息科学(英文版)/Journal Science China Information SciencesCSCDCSTPCDEISCI
查看更多>>《中国科学》是中国科学院主办、中国科学杂志社出版的自然科学专业性学术刊物。《中国科学》任务是反映中国自然科学各学科中的最新科研成果,以促进国内外的学术交流。《中国科学》以论文形式报道中国基础研究和应用研究方面具有创造性的、高水平的和有重要意义的科研成果。在国际学术界,《中国科学》作为代表中国最高水平的学术刊物也受到高度重视。国际上最具有权威的检索刊物SCI,多年来一直收录《中国科学》的论文。1999年《中国科学》夺得国家期刊奖的第一名。
正式出版
收录年代

    ControlService:a containerized solution for control-algorithm-as-a-service in cloud control systems

    Chenggang SHANRunze GAZhen YANGWei ZHANG...
    168-185页
    查看更多>>摘要:As an extension of networked control systems,cloud control systems(CCSs)have emerged as a new control paradigm to improve the service quality of emerging control missions,such as data-driven model-ing and automated vehicles.Existing studies have used the workflow-based restructured method to optimize the computation-intensive algorithms in the CCSs.However,the challenges here are how to define and sub-mit these algorithms'workflows as cloud services and execute these algorithms'workflows in a containerized manner.Based on these challenges,we propose a containerized solution for the control-algorithm-as-a-service(C3aS)in the CCSs,namely ControlService.It offers the control algorithm as a cloud workflow service and uses a customized workflow engine to realize the containerized execution.First,we employ a cloud workflow representation method to define a control algorithm into an abstract cloud workflow form.Afterward,we provide a cloud service representation of the abstract cloud workflow.Next,we design a workflow engine and submit the cloud service to this workflow engine to implement containerized execution of this cloud service in the CCSs.In the experiment,we discuss the cloud service form and containerized implementation of the subspace identification method.Experimental results show that the proposed ControlService has significant performance advantages in computational time,reduction percentage,and speedup ratio compared with the baseline method.

    State estimation for delayed switched positive systems:delayed radius approach

    Weizhong CHENZhongyang FEIXudong ZHAOZheng-Guang WU...
    186-201页
    查看更多>>摘要:In this paper,an interval estimation scheme is developed for delayed switched positive systems(DSPS)with mode-dependent average dwell time switching.A lossless zonotopic estimation approach is proposed for the delayed intersection zonotope with the positive generator matrix.First,considering the existence of asynchronism between the system mode and the correction matrix mode,the mismatched inter-section zonotope is constructed for DSPS to verify the consistency between the system model and outputs.Then,by utilizing the introduced radius definitions,the ℓ∞ performance is addressed to optimize the size of delayed intersection zonotopes.Subsequently,we present a joint-design approach of switching signals and the mode-dependent correction matrix by constructing positive generator matrix-based delayed radius func-tions.Furthermore,guaranteed nonnegative state bounds are derived for the considered DSPS based on the proposed lossless zonotopic estimation criteria.Finally,detailed simulations are conducted to validate the feasibility and superiority of the developed methods.

    Skill enhancement learning with knowledge distillation

    Naijun LIUFuchun SUNBin FANGHuaping LIU...
    202-216页
    查看更多>>摘要:Skill learning through reinforcement learning has significantly progressed in recent years.How-ever,it often struggles to efficiently find optimal or near-optimal policies due to the inherent trial-and-error exploration in reinforcement learning.Although algorithms have been proposed to enhance skill learning efficacy,there is still much room for improvement in terms of skill learning performance and training sta-bility.In this paper,we propose an algorithm called skill enhancement learning with knowledge distillation(SELKD),which integrates multiple actors and multiple critics for skill learning.SELKD employs knowledge distillation to establish a mutual learning mechanism among actors.To mitigate critic overestimation bias,we introduce a novel target value calculation method.We also perform theoretical analysis to ensure the convergence of SELKD.Finally,experiments are conducted on several continuous control tasks,illustrating the effectiveness of the proposed algorithm.

    Legitimate monitor by proactive guarding for counter covert communications

    Manlin WANGBin XIAJiangzhou WANG
    217-233页
    查看更多>>摘要:Covert communication has been widely investigated to avoid the transmission behavior being overheard by the warder.However,covert communication may be illegitimately utilized by unauthorized parties to evade the supervision of authorized agencies,which leads to great challenges to information se-curity.To meet the need for authorized parties to monitor and prevent illegitimate transmission between unauthorized nodes,a novel paradigm,called legitimate monitor,is proposed for counter covert communica-tions.In the preceding covert communication system,the covert transmission rate is the focus.Differently,the core concern of the legitimate monitor system is the outage probability of the transmission between unauthorized nodes,which should be maximized to interrupt the potential but undetectable transmission.To achieve these goals effectively,a proactive guarding approach is proposed,where the authorized warder detects the transmission behavior and emits jamming signals to interfere with the potential transmission,simultaneously.In particular,the jamming power at the warder is optimized under cases where the instan-taneous/statistical channel state information is available.Besides,the corresponding outage probability is derived to evaluate the system performance,which can also be simplified to scenarios with a passive warder.Numerical results demonstrate that proactive guarding outperforms the passive one,especially when the warder is not proximal to the unauthorized transmitter.In addition,the proposed jamming power allocation scheme also outperforms other benchmark schemes.

    Identifying malicious traffic under concept drift based on intraclass consistency enhanced variational autoencoder

    Xiang LUOChang LIUGaopeng GOUGang XIONG...
    234-248页
    查看更多>>摘要:Accurate identification of malicious traffic is crucial for implementing effective defense counter-measures and has led to extensive research efforts.However,the continuously evolving techniques employed by adversaries have introduced the issues of concept drift,which significantly affects the performance of existing methods.To tackle this challenge,some researchers have focused on improving the separability of malicious traffic representation and designing drift detectors to reduce the number of false positives.Nevertheless,these methods often overlook the importance of enhancing the generalization and intraclass consistency in the representation.Additionally,the detectors are not sufficiently sensitive to the variations among different malicious traffic classes,which results in poor performance and limited robustness.In this paper,we propose intraclass consistency enhanced variational autoencoder with Class-Perception detector(ICE-CP)to identify malicious traffic under concept drift.It comprises two key modules during training:intraclass consistency enhanced(ICE)representation learning and Class-Perception(CP)detector construc-tion.In the first module,we employ a variational autoencoder(VAE)in conjunction with Kullback-Leibler(KL)-divergence and cross-entropy loss to model the distribution of each input malicious traffic flow.This approach simultaneously enhances the generalization,interclass consistency,and intraclass differences in the learned representation.Consequently,we obtain a compact representation and a trained classifier for non-drifting malicious traffic.In the second module,we design the CP detector,which generates a centroid and threshold for each malicious traffic class separately based on the learned representation,depicting the boundaries between drifting and non-drifting malicious traffic.During testing,we utilize the trained classi-fier to predict malicious traffic classes for the testing samples.Then,we use the CP detector to detect the potential drifting samples using the centroid and threshold defined for each class.We evaluate ICE-CP and some advanced methods on various real-world malicious traffic datasets.The results show that our method outperforms others in identifying malicious traffic and detecting potential drifting samples,demonstrating outstanding robustness among different concept drift settings.

    Multi-party privacy-preserving decision tree training with a privileged party

    Yiwen TONGQi FENGMin LUODebiao HE...
    249-264页
    查看更多>>摘要:Currently,a decision tree is the most commonly used data mining algorithm for classification tasks.While a significant number of studies have investigated privacy-preserving decision trees,the methods proposed in these studies often have shortcomings in terms of data privacy breach or efficiency.Additionally,these methods typically only apply to symmetric frameworks,which consist of two or more parties with equal privilege,and are not suitable for asymmetric scenarios where parties have unequal privilege.In this paper,we propose SecureCART,a three-party privacy-preserving decision tree training scheme with a privileged party.We adopt the existing pMPL framework and design novel secure interactive protocols for division,comparison,and asymmetric multiplication.Compared to similar schemes,our division protocol is 93.5-560.4 × faster,with the communication overhead reduced by over 90%;further,our multiplication protocol is approximately 1.5× faster,with the communication overhead reduced by around 20%.Our comparison protocol based on function secret sharing maintains good performance when adapted to pMPL.Based on the proposed secure protocols,we implement SecureCART in C++and analyze its performance using three real-world datasets in both LAN and WAN environments.he experimental results indicate that SecureCART is significantly faster than similar schemes proposed in past studies,and that the loss of accuracy while using SecureCART remains within an acceptable range.

    Robust textile-based spoof plasmonic frequency scanning antenna for on-body IoT applications

    Zhao-Min CHENJun-Lin ZHANHao CHENYa LI...
    265-280页
    查看更多>>摘要:Securing a comfortable,wearable compact frequency beam scanning antenna(FBSA)with ro-bustness to deformation,low specific absorption rate(SAR),and good coverage of the surrounding envi-ronment for Internet of Things(IoT)applications,such as on-body navigation and wireless communication is an emerging challenge.In this work,a robust textile-based spoof plasmonic frequency scanning antenna utilizing higher-order modes is presented,which is also robust to deformation caused by the activities of the human body.The innovative design of the element ensures the high-efficiency transmission of the fun-damental mode of spoof surface plasmon polaritons(SSPP)structure,providing the potential of being a multifunctional composite device in the compact on-body network.Besides,an artificial magnetic conductor(AMC)is designed underneath the SSPP structure,obtaining a low SAR value(0.113 W/kg),which ensures the safety of users.As a practical realization of this concept,a textile-based spoof plasmonic antenna was fabricated in the microwave regime and the performed experimental results show the proposed antenna has a single-beam radiation characteristic with a 70° beam scanning angle range when the frequency is 4.7-6.0 GHz with a high average realized gain of 13.15 dBi.And it still maintains a steady performance when faced with structure deformation,which proves its robustness.Wireless communication quality experiments are performed to demonstrate the proposed antenna can measure the angles of targets and realize wireless signal transmission to specific targets as the frequency varies,it may find great potential in the field of on-body IoT applications.

    An adaptive 3D reconstruction method for asymmetric dual-angle multispectral stereo imaging system on UAV platform

    Chen WANGXian LIYanfeng GUZixu WANG...
    281-295页
    查看更多>>摘要:A multispectral imaging system often cannot capture 3D spatial information owing to hardware limitations,which diminishes the effectiveness across various domains.To address this problem,we have de-veloped a multispectral stereo imaging system along with an adaptive 3D reconstruction algorithm.Unlike existing unmanned aerial vehicle stereo imaging systems,our multispectral stereo imaging system uses two multispectral cameras with asymmetric spectral bands positioned at different angles.This design enables the acquisition of a higher number of bands and lateral spatial information while maintaining a lightweight struc-ture.This system introduces challenges such as large geometric distortions and intensity differences between multiple bands.To accurately recover 3D spatial information,we propose an adaptive 3D reconstruction method.This method employs a position and orientation system-assisted projection transformation and a normalized threshold adjustment strategy.Finally,mutual information is used to reconstruct the multispec-tral images densely,effectively addressing nonlinear differences and generating a comprehensive multispectral point cloud.Our stereo system was used for two real data collections in different regions,and the efficacy of the proposed 3D reconstruction method was validated by comparing it with existing methods and commercial software.

    A comprehensive analysis of DAC-SDC FPGA low power object detection challenge

    Jingwei ZHANGGuoqing LIMeng ZHANGXinye CAO...
    296-316页
    查看更多>>摘要:The lower power object detection challenge(LPODC)at the IEEE/ACM Design Automation Conference is a premier contest in low-power object detection and algorithm(software)-hardware co-design for edge artificial intelligence,which has been a success in the past five years.LPODC focused on designing and implementing novel algorithms on the edge platform for object detection in images taken from unmanned aerial vehicles(UAVs),which attracted hundreds of teams from dozens of countries to participate.Our team SEUer has been participating in this competition for three consecutive years from 2020 to 2022 and obtained sixth place respectively in 2020 and 2021.Recently,we achieved the championship in 2022.In this paper,we presented the LPODC for UAV object detection from 2018 to 2022,including the dataset,hardware platform,and evaluation method.In addition,we also introduced and discussed the details of methods proposed by each year's top three teams from 2018 to 2022 in terms of network,accuracy,quantization method,hardware performance,and total score.Additionally,we conducted an in-depth analysis of the selected entries and results,along with summarizing representative methodologies.This analysis serves as a valuable practical resource for researchers and engineers in deploying the UAV application on edge platforms and enhancing its feasibility and reliability.According to the analysis and discussion,it becomes evident that the adoption of a hardware-algorithm co-design approach is paramount in the context of tiny machine learning(TinyML).This approach surpasses the mere optimization of software and hardware as separate entities,proving to be essential for achieving optimal performance and efficiency in TinyML applications.

    Tuning the ferroelectricity of Hf0.5Zr0.5O2 with alloy electrodes

    Keqin LIUBingjie DANGZhiyu YANGTeng ZHANG...
    317-326页
    查看更多>>摘要:Tuning ferroelectricity of Hf0.5Zr0.5O2 is crucial for facilitating its practical applications in various fields,including in-memory and neuromorphic computing.Previous studies have revealed that the electrodes have a significant influence on ferroelectricity,and changing electrode materials can realize different but discrete ferroelectric polarization values.Here,we introduce an alloy-electrode method,in order to achieve gradual and accurate modulation of ferroelectric polarization,especially useful for matching the polarization charges at the interface of ferroelectric insulators and ferroelectric semiconductors.Au and W electrodes are chosen as baselines for realizing weak and strong ferroelectric polarization,where the intermediate states can be achieved by adjusting the ratio of metals in the Au-W alloy.To demonstrate the generality of this approach,the Cu-W alloy electrode is also realized for tuning ferroelectric polarization.The effect of alloy electrodes on device leakage current,endurance,and retention is evaluated.In addition,the temperature stability of ferroelectric capacitors is tested,where limited changes in both remnant polarization and coercive voltages are observed,showing the great potential of the ferroelectric hafnium oxide.Such gradual modulation of ferroelectric polarization could facilitate the application of Hf0.5Zr0.5O2 in in-memory and neuromorphic computing.